Description
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References (1)
Core 1
Core References
Third Party Advisory x_refsource_confirm
https://cert.vde.com/en-us/advisories/vde-2021-026
Scores
CVSS v3
8.8
EPSS
0.0226
EPSS Percentile
84.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (8)
weidmueller/ie-wl-bl-ap-cl-eu_firmware
< 1.16.18
weidmueller/ie-wl-bl-ap-cl-us_firmware
< 1.16.18
weidmueller/ie-wl-vl-ap-br-cl-eu_firmware
< 1.16.18
weidmueller/ie-wl-vl-ap-br-cl-us_firmware
< 1.16.18
weidmueller/ie-wlt-bl-ap-cl-eu_firmware
< 1.16.18
weidmueller/ie-wlt-bl-ap-cl-us_firmware
< 1.16.18
weidmueller/ie-wlt-vl-ap-br-cl-eu_firmware
< 1.16.18
weidmueller/ie-wlt-vl-ap-br-cl-us_firmware
< 1.16.18
Published
Jun 25, 2021
Tracked Since
Feb 18, 2026